共 50 条
- [1] Securing peer-to-peer overlay networks from Sybil attack 2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 1213 - 1218
- [2] Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2731 - 2749
- [4] Ethereum’s Peer-to-Peer Network Monitoring and Sybil Attack Prevention Journal of Network and Systems Management, 2022, 30
- [5] Mitigating Peer-to-Peer Botnets by Sybil attacks 2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 241 - 243
- [6] A Sybil-Resilient Peer-to-Peer Network Protocol WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 682 - 685
- [7] Novel Sybil Defense Scheme for Peer-to-peer Applications 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
- [8] Defeating against sybil-attacks in peer-to-peer networks 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1218 - 1222
- [9] Defending Against sybil-attacks in Peer-to-Peer Networks INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 329 - 340